US7555526B1 - Actions on auto-generated emails from the inbox - Google Patents

Actions on auto-generated emails from the inbox Download PDF

Info

Publication number
US7555526B1
US7555526B1 US12/172,011 US17201108A US7555526B1 US 7555526 B1 US7555526 B1 US 7555526B1 US 17201108 A US17201108 A US 17201108A US 7555526 B1 US7555526 B1 US 7555526B1
Authority
US
United States
Prior art keywords
user
control character
computer application
email
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
US12/172,011
Inventor
Niklas Heidloff
Kristina Beckley
Stanley Kieran Jerrard-Dunne
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US12/172,011 priority Critical patent/US7555526B1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HEIDLOFF, NIKLAS, BECKLEY, KRISTINA, JERRARD-DUNNE, STANLEY KIERAN
Application granted granted Critical
Publication of US7555526B1 publication Critical patent/US7555526B1/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]

Definitions

  • the example embodiments relate to a method for handling email messages.
  • Email messaging is a common form of communication, especially in the workplace.
  • email may serve as a reminder of a task to be completed.
  • Auto-generated emails may allow a user to keep track of tasks in the inbox of the email program.
  • the user may click on a link in the email, follow the link to the application, authenticate into the application by entering a password, and navigate through a number of screens in the application to finally arrive at the action screen where the task can be completed.
  • This process especially the navigation of multiple levels of the application, is cumbersome, confusing, and time consuming.
  • a control character specifying a computer application may be determined to be included in an email message.
  • the control character in the email may be compared to a library of control characters, such that each control character in the library corresponds to a command. If the control character in the email corresponds to a control character in the library, the command associated with the character may be executed, which may display a user interface in the email program, the user interface including at least two user-selectable actions specific to the computer application.
  • the user may select an action from the user interface, which may execute the computer application in accordance with the selected action and automatically authenticate the user onto the computer application.
  • FIG. 1 is an example embodiment of the system.
  • FIG. 2 illustrates a flow chart of a process according to at least one example embodiment.
  • FIG. 2 is a flow diagram of a program logic 120 , which can be embodied as a sequence of computer program instructions stored in the memory 102 of the computer 100 of FIG. 1 .
  • the program logic 120 is executed by the processor 104 to carry out the functions of the embodiments.
  • Step 200 discloses storing at least one password.
  • a user may have at least one password to login and access a network, and may also have the same or a different password for each computer application.
  • the password may be stored in the memory 120 of the computer 100 , such as in password storage 121 , after being entered by the user with the keyboard and mouse 110 .
  • the at least one password may be stored on the network.
  • the user may be prompted to enter a password
  • the computer may automatically enter the password from the password storage 121 and request confirmation by the user, or the computer may automatically authenticate using a password from the password storage 121 .
  • Step 205 discloses an example of receiving an email message 130 .
  • the email message 130 may be received through a network connection 112 , such as the internet or an organizational intranet, and a network interface 106 of the computer 100 .
  • the computer 100 may organize and process the email message 130 using an email program 122 .
  • Step 210 discloses an example of determining whether an incoming email message 130 includes a control character 140 .
  • a control character 140 may be any non-display command that signals to the computer to perform an action.
  • the control character may be a command to execute a specific computer application, such as a computer application that requires a password.
  • the control character may be a control word or a control phrase.
  • the control character 140 may be an additional field in the email message, metadata, text embedded in the email, or any other form of control character, word, or phrase known to those skilled in the art.
  • a control character may be detected in the email message using a detection program 123 , which may include subject matching, text analysis, language processing, or any other filtering or analysis technology known to those skilled in the art.
  • Step 215 the program may terminate at Step 215 and revert to Step 205 .
  • Step 220 discloses an exemplary comparison.
  • the library 124 may include a buffer for each control character associated with the program, wherein each buffer may store a string.
  • a comparison program 125 may compare the email message 130 to each string in the library 124 to determine whether a control character 140 in the email 130 corresponds to a control character in the library 124 .
  • control character 140 in the email message 130 does not correspond to a control character in the library 124 , then the program may terminate in Step 215 and revert to Step 205 .
  • the computer may execute any command that is associated with the control character. By executing the command at Step 225 , the computer 100 may then perform the corresponding action at Step 230 , such as displaying a user interface that includes at least two user-selectable actions specific to the computer application.
  • the user interface may be a “pop-up” pane in the email program or a user interface in a different window or tab.
  • the user interface may also be a “push button”-type user interface, and may include a “mouse rollover” function.
  • the options presented in the user interface may cause the computer application to be displayed, or may complete the task directly from the email program without displaying the application.
  • Step 235 The user may then select an available action from the user interface, as exemplified by Step 235 . Such a selection may execute the computer application in Step 240 . In addition, the selection may also cause the automatic authentication of a user onto the computer application.
  • Step 245 discloses an exemplary authentication. Using at least one stored password that corresponds to the computer application, the authentication program 126 allows access to the application without the need to re-enter a password for the application.
  • An example of such an authentication program may be Single Sign-On (SSO). The process may then revert to Step 205 .
  • SSO Single Sign-On

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Data Mining & Analysis (AREA)
  • Economics (AREA)
  • Computer Hardware Design (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The example embodiments relate to a method for handling and analyzing emails. In accordance with at least one example embodiment, a control character specifying a computer application may be determined to be included in an email message. The control character in the email may be compared to a library of control characters, such that each control character in the library corresponds to a command. If the control character in the email corresponds to a control character in the library, the command associated with the character may be executed, which may display a user interface in the email program, the user interface including at least two user-selectable actions specific to the computer application. The user may select an action from the user interface, which may execute the computer application in accordance with the selected action and automatically authenticate the user onto the computer application.

Description

FIELD
The example embodiments relate to a method for handling email messages.
BACKGROUND
Email messaging is a common form of communication, especially in the workplace. Among its many uses, email may serve as a reminder of a task to be completed. Auto-generated emails may allow a user to keep track of tasks in the inbox of the email program. Thus, when a user receives an auto-generated reminder email that requires an action in another computer application, such as approving or rejecting a request, the user may click on a link in the email, follow the link to the application, authenticate into the application by entering a password, and navigate through a number of screens in the application to finally arrive at the action screen where the task can be completed. This process, especially the navigation of multiple levels of the application, is cumbersome, confusing, and time consuming.
SUMMARY
The example embodiments relate to a method for handling and analyzing emails. In accordance with at least one example embodiment, a control character specifying a computer application may be determined to be included in an email message. The control character in the email may be compared to a library of control characters, such that each control character in the library corresponds to a command. If the control character in the email corresponds to a control character in the library, the command associated with the character may be executed, which may display a user interface in the email program, the user interface including at least two user-selectable actions specific to the computer application. The user may select an action from the user interface, which may execute the computer application in accordance with the selected action and automatically authenticate the user onto the computer application.
DESCRIPTION OF THE FIGURES
FIG. 1 is an example embodiment of the system.
FIG. 2 illustrates a flow chart of a process according to at least one example embodiment.
DETAILED DISCUSSION OF EMBODIMENTS
FIG. 2 is a flow diagram of a program logic 120, which can be embodied as a sequence of computer program instructions stored in the memory 102 of the computer 100 of FIG. 1. The program logic 120 is executed by the processor 104 to carry out the functions of the embodiments.
Referring to FIG. 2, Step 200 discloses storing at least one password. A user may have at least one password to login and access a network, and may also have the same or a different password for each computer application. The password may be stored in the memory 120 of the computer 100, such as in password storage 121, after being entered by the user with the keyboard and mouse 110. In an alternative embodiment, the at least one password may be stored on the network. In order to login the network or a computer application, the user may be prompted to enter a password, the computer may automatically enter the password from the password storage 121 and request confirmation by the user, or the computer may automatically authenticate using a password from the password storage 121.
Step 205 discloses an example of receiving an email message 130. The email message 130 may be received through a network connection 112, such as the internet or an organizational intranet, and a network interface 106 of the computer 100. The computer 100 may organize and process the email message 130 using an email program 122.
Step 210 discloses an example of determining whether an incoming email message 130 includes a control character 140. A control character 140 may be any non-display command that signals to the computer to perform an action. For example, the control character may be a command to execute a specific computer application, such as a computer application that requires a password. In an alternative embodiment, the control character may be a control word or a control phrase. The control character 140 may be an additional field in the email message, metadata, text embedded in the email, or any other form of control character, word, or phrase known to those skilled in the art. A control character may be detected in the email message using a detection program 123, which may include subject matching, text analysis, language processing, or any other filtering or analysis technology known to those skilled in the art.
If a control character 140 is not determined to be included in the email message 130, the program may terminate at Step 215 and revert to Step 205.
If a control character 140 is detected in the email message 130, the control character 140 may then be compared to a library 124 of control characters, which may be stored in the memory 102 of the computer 100. Step 220 discloses an exemplary comparison. The library 124 may include a buffer for each control character associated with the program, wherein each buffer may store a string. A comparison program 125 may compare the email message 130 to each string in the library 124 to determine whether a control character 140 in the email 130 corresponds to a control character in the library 124.
If the control character 140 in the email message 130 does not correspond to a control character in the library 124, then the program may terminate in Step 215 and revert to Step 205.
If the comparison program determines that a control character 140 in the email 130 corresponds to a control character in the library 124, the computer may execute any command that is associated with the control character. By executing the command at Step 225, the computer 100 may then perform the corresponding action at Step 230, such as displaying a user interface that includes at least two user-selectable actions specific to the computer application. The user interface may be a “pop-up” pane in the email program or a user interface in a different window or tab. The user interface may also be a “push button”-type user interface, and may include a “mouse rollover” function. The options presented in the user interface may cause the computer application to be displayed, or may complete the task directly from the email program without displaying the application.
The user may then select an available action from the user interface, as exemplified by Step 235. Such a selection may execute the computer application in Step 240. In addition, the selection may also cause the automatic authentication of a user onto the computer application. Step 245 discloses an exemplary authentication. Using at least one stored password that corresponds to the computer application, the authentication program 126 allows access to the application without the need to re-enter a password for the application. An example of such an authentication program may be Single Sign-On (SSO). The process may then revert to Step 205.
The embodiments and examples described above are not intended to be limiting, and may be embodied in many forms that are not specifically disclosed herein. Changes and modifications are not precluded and may be made within the spirit and scope of the embodiments.

Claims (1)

1. A method, comprising:
storing at least one password of a user on a computer;
receiving, in an email program in said computer, an email message for the user from a network;
determining whether said email message includes a control character, said control character specifying a computer application requiring a password;
if said email message includes said control character, comparing said control character to a library of control characters, each of said control characters in said library of control characters corresponding to a command;
if said control character in said email message corresponds to a control character in said library of control characters, executing said corresponding command, wherein said corresponding command displays a user interface in the email program, the user interface including at least two user-selectable actions specific to the computer application;
selecting, by the user, an action from the at least two user-selectable actions specific to the computer application available from the user interface;
executing the computer application in accordance with the selected action; and
automatically authenticating the user onto said computer application by matching at least one of the passwords of the user stored on said computer to the password required by said computer application.
US12/172,011 2008-07-11 2008-07-11 Actions on auto-generated emails from the inbox Expired - Fee Related US7555526B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/172,011 US7555526B1 (en) 2008-07-11 2008-07-11 Actions on auto-generated emails from the inbox

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/172,011 US7555526B1 (en) 2008-07-11 2008-07-11 Actions on auto-generated emails from the inbox

Publications (1)

Publication Number Publication Date
US7555526B1 true US7555526B1 (en) 2009-06-30

Family

ID=40793598

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/172,011 Expired - Fee Related US7555526B1 (en) 2008-07-11 2008-07-11 Actions on auto-generated emails from the inbox

Country Status (1)

Country Link
US (1) US7555526B1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7877454B1 (en) * 2007-08-06 2011-01-25 Shane Horan Hunter Electronic messaging
US9215202B1 (en) * 2011-01-07 2015-12-15 Brian K. Buchheit Online form completion and saving triggered by receipt of an email message at a final email server
US20160029104A1 (en) * 2009-10-14 2016-01-28 Time Warner Cable Enterprises Llc System and Method For Presenting During A Programming Event An Invitation To Follow Content On A Social Media Site
US20170126606A1 (en) * 2014-04-30 2017-05-04 Linkedln Corporation Embedding and executing commands in messages
US9749275B2 (en) 2013-10-03 2017-08-29 Yandex Europe Ag Method of and system for constructing a listing of E-mail messages
US10630620B2 (en) 2017-01-05 2020-04-21 Microsoft Technology Licensing, Llc Performing updates to action items in an electronic communication application with a single input
US11283748B2 (en) 2015-08-31 2022-03-22 Micro Focus Llc Message based information technology service management

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998016894A1 (en) 1996-10-11 1998-04-23 Wall Data Incorporated Mail notes interface with an auto-hideable tray functioning with various e-mail systems
US20010016845A1 (en) 1997-02-10 2001-08-23 Bruce Tribbensee Method and apparatus for receiving information in response to a request from an email client
US20020037714A1 (en) 2000-09-27 2002-03-28 Naohito Takae Method and system of remotely controlling a portable terminal and a computer product
US20020107904A1 (en) 2000-12-05 2002-08-08 Kumar Talluri Remote service agent for sending commands and receiving data over e-mail network
US6654892B1 (en) * 1999-06-08 2003-11-25 Sun Microsystems, Inc. Methods and apparatus for permitting transactions across firewalls
US20040019643A1 (en) * 2002-07-23 2004-01-29 Canon Kabushiki Kaisha Remote command server
US6829607B1 (en) 2000-04-24 2004-12-07 Microsoft Corporation System and method for facilitating user input by automatically providing dynamically generated completion information
US20040254998A1 (en) 2000-06-17 2004-12-16 Microsoft Corporation When-free messaging
US6983308B1 (en) 1998-11-19 2006-01-03 Openwave Systems, Inc. Mail synchronization of remote and local mail systems
US7054906B2 (en) 2000-12-29 2006-05-30 Levosky Michael P System and method for controlling and organizing Email
US20060143273A1 (en) 2004-12-28 2006-06-29 Taiwan Semiconductor Manufacturing Co., Ltd. Operation system and method of workflow integrated with a mail platform and web applications
US20070033588A1 (en) * 2005-08-02 2007-02-08 Landsman Richard A Generic download and upload functionality in a client/server web application architecture
US20070190995A1 (en) 2006-02-13 2007-08-16 Nokia Corporation Remote control of a mobile device
US20080256206A1 (en) * 2007-04-10 2008-10-16 Samsung Electronics Co., Ltd Apparatus and method for pushing e-mail to portable terminal in e-mail system

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998016894A1 (en) 1996-10-11 1998-04-23 Wall Data Incorporated Mail notes interface with an auto-hideable tray functioning with various e-mail systems
US20010016845A1 (en) 1997-02-10 2001-08-23 Bruce Tribbensee Method and apparatus for receiving information in response to a request from an email client
US6983308B1 (en) 1998-11-19 2006-01-03 Openwave Systems, Inc. Mail synchronization of remote and local mail systems
US6654892B1 (en) * 1999-06-08 2003-11-25 Sun Microsystems, Inc. Methods and apparatus for permitting transactions across firewalls
US6829607B1 (en) 2000-04-24 2004-12-07 Microsoft Corporation System and method for facilitating user input by automatically providing dynamically generated completion information
US20040254998A1 (en) 2000-06-17 2004-12-16 Microsoft Corporation When-free messaging
US20020037714A1 (en) 2000-09-27 2002-03-28 Naohito Takae Method and system of remotely controlling a portable terminal and a computer product
US20020107904A1 (en) 2000-12-05 2002-08-08 Kumar Talluri Remote service agent for sending commands and receiving data over e-mail network
US7054906B2 (en) 2000-12-29 2006-05-30 Levosky Michael P System and method for controlling and organizing Email
US20040019643A1 (en) * 2002-07-23 2004-01-29 Canon Kabushiki Kaisha Remote command server
US20060143273A1 (en) 2004-12-28 2006-06-29 Taiwan Semiconductor Manufacturing Co., Ltd. Operation system and method of workflow integrated with a mail platform and web applications
US20070033588A1 (en) * 2005-08-02 2007-02-08 Landsman Richard A Generic download and upload functionality in a client/server web application architecture
US20070190995A1 (en) 2006-02-13 2007-08-16 Nokia Corporation Remote control of a mobile device
US20080256206A1 (en) * 2007-04-10 2008-10-16 Samsung Electronics Co., Ltd Apparatus and method for pushing e-mail to portable terminal in e-mail system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Gwizdka, J.; TaskView-Design and Evaluation of a Task-Based Email Interface, Proceedings of the IBM Centers for Advanced Studies Conference-CASCON 2002; IBM: Toronto, Canada 136-145.

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7877454B1 (en) * 2007-08-06 2011-01-25 Shane Horan Hunter Electronic messaging
US20160029104A1 (en) * 2009-10-14 2016-01-28 Time Warner Cable Enterprises Llc System and Method For Presenting During A Programming Event An Invitation To Follow Content On A Social Media Site
US10375455B2 (en) * 2009-10-14 2019-08-06 Time Warner Cable Enterprises Llc System and method for presenting during a programming event an invitation to follow content on a social media site
US9215202B1 (en) * 2011-01-07 2015-12-15 Brian K. Buchheit Online form completion and saving triggered by receipt of an email message at a final email server
US9749275B2 (en) 2013-10-03 2017-08-29 Yandex Europe Ag Method of and system for constructing a listing of E-mail messages
US9794208B2 (en) 2013-10-03 2017-10-17 Yandex Europe Ag Method of and system for constructing a listing of e-mail messages
US20170126606A1 (en) * 2014-04-30 2017-05-04 Linkedln Corporation Embedding and executing commands in messages
US9954809B2 (en) * 2014-04-30 2018-04-24 Microsoft Technology Licensing, Llc Embedding and executing commands in messages
US11283748B2 (en) 2015-08-31 2022-03-22 Micro Focus Llc Message based information technology service management
US10630620B2 (en) 2017-01-05 2020-04-21 Microsoft Technology Licensing, Llc Performing updates to action items in an electronic communication application with a single input

Similar Documents

Publication Publication Date Title
US7555526B1 (en) Actions on auto-generated emails from the inbox
US10140014B2 (en) Method and terminal for activating application based on handwriting input
EP2601571B1 (en) Input to locked computing device
US9026944B2 (en) Managing content through actions on context based menus
US9086794B2 (en) Determining gestures on context based menus
US9027117B2 (en) Multiple-access-level lock screen
US8225227B2 (en) Managing display of user interfaces
US20170337176A1 (en) Message correction and updating system and method, and associated user interface operation
US20150207800A1 (en) Systems and methods for enabling access to a web application
US20040243415A1 (en) Architecture for a speech input method editor for handheld portable devices
US9858070B2 (en) Development team file collaboration
US9596087B2 (en) Token authentication for touch sensitive display devices
US11574144B2 (en) Performance of a computer-implemented model that acts as a multi-class classifier
US20090094343A1 (en) System and Method for Freezing Portions of a Chat Conversation in an Instant Messaging System
US20130151956A1 (en) Autocorrect confirmation system
US20100287498A1 (en) User interface command disambiguation in a multi-window operating environment
US8381104B2 (en) Systems and methods for providing context recognition
CN107203318A (en) The open method and device of a kind of application program
US10733377B2 (en) Indicating automatically corrected words
CN109828820A (en) Focus refreshing method and device of application window, storage medium and terminal
US9311134B1 (en) Automated creation of executable workflow
US20180367491A1 (en) Follow-up queue for mobile device notifications
US20180246588A1 (en) Controlling displayed content using stylus rotation
EP2360578B1 (en) A method for detecting user screens in mobile devices working under symbian operating system
US20130249810A1 (en) Text entry mode selection

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HEIDLOFF, NIKLAS;BECKLEY, KRISTINA;JERRARD-DUNNE, STANLEY KIERAN;REEL/FRAME:021228/0866;SIGNING DATES FROM 20080630 TO 20080711

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAY Fee payment

Year of fee payment: 4

SULP Surcharge for late payment
REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20170630